Which lock mode do you use if you want lock data can be edited only by one user and protects the locked objects against all types of other transactions?
Which lock mode do you use if you want lock data can be edited only by one user and protects the locked objects against all types of other transactions?A . Read locks (lock mode Shored)B . Optimistic locks (lock mode Optimistic)C . Write locks (lock mode Exclusive)D . Enhanced write...
Concerning some (CCMS) monitoring terminology, which of the following statements are correct? (Choose three)
Concerning some (CCMS) monitoring terminology, which of the following statements are correct? (Choose three)A . Each MTE can only be used in exactly one customer-defined monitor definition at a time.B . Each monitoring attribute is assigned to exactly one monitoring object.C . A monitoring attribute is also a monitoring tree...
Which of the programming languages listed below are implemented platform-independently?
Which of the programming languages listed below are implemented platform-independently?A . C/C++B . ABAPC . JavaD . FortranView AnswerAnswer: B
What is the transaction code to delete a client? (Please choose one correct answer)
What is the transaction code to delete a client? (Please choose one correct answer)A . SCC4B . SCC3C . SCC5D . SCC9E . SCC1View AnswerAnswer: C
When an external program triggers a background processing event, which operating system executable of the SAP system is used in triggering the event?
When an external program triggers a background processing event, which operating system executable of the SAP system is used in triggering the event?A . sapevent_launcherB . sapevtC . rfcView AnswerAnswer: B
Which of the following steps do you need to perform when installing an agent?
Which of the following steps do you need to perform when installing an agent?A . Create the CSMCONF fileB . Start agent registration in the Visual AdministratorC . Set up an RFC connection to the central monitoring system before the installationD . Create the CSMADMIN userView AnswerAnswer: A
Which Typical Access Technology will use SAP ERP (with SAP ECC)? Please choose one correct answer
Which Typical Access Technology will use SAP ERP (with SAP ECC)? Please choose one correct answerA . SAP GUI for Windows (GUI = Graphical User Interface)B . Browser-based interface (different browsers possible) BEx Analyzer (additionally requires Excel on the front-end)C . SAP NetWeaver Business ClientD . Browser-based interface (different browsers...
To Configure Import Server which of the following parameters Required?
To Configure Import Server which of the following parameters Required?A . Repository NameB . ODBC Data SourceC . Server AddressD . Data ServiceView AnswerAnswer: D
What is default value for all?
With the start profile parameter service/hostname you can also determine the IP address / host name to which the Web service port should be connected, to limit accessibility in the network. What is default value for all?A . /255.255.255.0B . /192.168.1.0C . /192.168.1.1D . /0.0.0.0View AnswerAnswer: D
Which Typical Access Technology will use SAP NetWeaver Bl 7.0? Please choose one correct answer
Which Typical Access Technology will use SAP NetWeaver Bl 7.0? Please choose one correct answerA . Browser-based interface (different browsers possible) BEx Analyzer (additionally requires Excel on the front-end)B . Browser-based interface (different browsers possible)C . SAP NetWeaver Business ClientD . SAP GUI for Windows (GUI = Graphical User Interface)View...